getcertified4sure.com

The Only Tip You Need: 70-412 configuring advanced windows server 2012




Testking offers the most reliable as well as high-quality Microsoft 70-412 practice dumps for Microsoft certification exam. A new large amount of customers have faith inside our Microsoft Microsoft products. We are confident with the quality of our Microsoft Microsoft merchandise and that can be why all of us offer a no hassle 30 days Funds Back Ensure. If you fail the actual Microsoft exam after buying our merchandise, we can refund the entire amount. Testking gets the utmost source of Microsoft 70-412 exam questions and answers. These understandable Microsoft 70-412 study supplies are offered in downloadable Pdf formatting which is straightforward to make use of.

2021 Sep 70-412 configuring advanced windows server 2012 services:

Q91. Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Network Load Balancing (NLB) feature installed. The servers are configured as nodes in an NLB cluster named Cluster1. 

Port rules are configured for all clustered Applications. 

You need to ensure that Server2 handles all client requests to the cluster that are NOT covered by a port rule. 

What should you configure? 

A. Affinity-None 

B. Affinity-Single 

C. The cluster quorum settings 

D. The failover settings 

E. A file server for general use 

F. The Handling priority 

G. The host priority 

H. Live migration 

I. The possible owner 

J. The preferred owner 

K. Quick migration 

L. The Scale-Out File Server 

Answer: G 

Explanation: 

Host Priorities Each cluster host is assigned a unique host priority in the range of 1 to 32, where lower numbers denote higher priorities. The host with the highest host priority (lowest numeric value) is called the default host. It handles all client traffic for the virtual IP addresses that is not specifically intended to be load-balanced. This ensures that server applications not configured for load balancing only receive client traffic on a single host. If the default host fails, the host with the next highest priority takes over as default host. 

Reference: Network Load Balancing Technical Overview 

http://technet.microsoft.com/en-us/library/bb742455.aspx 


Q92. HOTSPOT 

Your network contains one Active Directory forest named contoso.com and one Active Directory forest named adatum.com. Each forest contains a single domain. 

You have the domain controllers configured as shown in the following table. 


You perform the following three actions: 

Create a user named User1 on DC3. 

Create a file named File1.txt in the SYSVOL folder on DC1. 

Create a Group Policy object (GPO) named GPO1 on DC1 and link GPO1 to 

Site2. 

You need to identify on which domain controller or controllers each object is stored. 

What should you identify? To answer, select the appropriate options in the answer area. 


Answer: 



Q93. A user named User1 is a member of the local Administrators group on Node1 and Node2. 

User1 creates a new clustered File Server role named File1 by using the File Server for general use option. 

A report is generated during the creation of File1 as shown in the exhibit. (Click the Exhibit button.) 


File1 fails to start. 

You need to ensure that you can start File1. 

What should you do? 

A. Log on to the domain by using the built-in Administrator for the domain, and then recreate the clustered File Server role by using the File Server for general use option. 

B. Assign the user account permissions of User1 to the Servers OU. 

C. Assign the computer account permissions of Cluster2 to the Servers OU. 

D. Increase the value of the ms-DS-MachineAccountQuota attribute of the domain. 

E. Recreate the clustered File Server role by using the File Server for scale-out application data option. 

Answer: B 

Explanation: 

Scenario: You have created a Windows Server 2012 Scale-Out File Server. The cluster, 

including the network and storage, pass the cluster validation test. Everything looks and is 

good. You create a File Server role for application data (SOFS) but it fails to start. 

Problem: Basically, the cluster needs permissions to create a computer object (for the 

SOFS) in the same Active Directory OU that the cluster object (Demo-FSC1) is stored in. 

Resolution: Reconfigure the permissions on the Servers OU. 

In this case we assign the user account permissions of User1 to the Servers OU. 

Reference: Scale-Out File Server Role Fails To Start With Event IDs 1205, 1069, and 1194 

http://www.aidanfinn.com/?p=14142 


Q94. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. 

Server1 and Server2 have the Hyper-V server role installed. The servers are configured as shown in the following table. 


You add a third server named Server3 to the network. Server3 has Intel processors. 

You need to move VM3 and VM6 to Server3. The solution must minimize downtime on the 

virtual machines. 

Which method should you use to move each virtual machine? 

To answer, select the appropriate method for each virtual machine in the answer area. 



Answer: 



Q95. HOTSPOT 

Your network contains an Active Directory domain named contoso.com. The domain contains two Active Directory sites named Site1 and Site2. 

You need to configure the replication between the sites to occur by using change notification. 

Which attribute should you modify? 


Answer: 



70-412 actual test

Avant-garde cbt nuggets 70-412 download:

Q96. Your network contains an Active Directory domain named contoso.com. The domain contains two servers named Server1 and Server2. Both servers have the Hyper-V server role installed. 

You plan to replicate virtual machines between Server1 and Server2. The replication will be encrypted by using Secure Sockets Layer (SSL). 

You need to request a certificate on Server1 to ensure that the virtual machine replication is encrypted. 

Which two intended purposes should the certificate for Server1 contain? (Each correct answer presents part of the solution. Choose two.) 

A. Client Authentication 

B. Kernel Mode Code Signing 

C. Server Authentication 

D. IP Security end system 

E. KDC Authentication 

Answer: A,C 

Explanation: 

You need to use certificate-based authentication if you want transmitted data to be encrypted. 

Replica Server Certificate Requirements 

To enable a server to receive replication traffic, the certificate in the replica server must meet the following conditions 

* Enhanced Key Usage must support both Client and Server authentication 

Etc. 

Reference: Hyper-V Replica - Prerequisites for certificate based deployments 

http://blogs.technet.com/b/virtualization/archive/2012/03/13/hyper-v-replica-certificate-requirements.aspx 


Q97. Your network contains two Active Directory forests named contoso.com and adatum.com. Each forest contains one domain. Contoso.com has a two-way forest trust to adatum.com. Selective authentication is enabled on the forest trust. 

Contoso contains 10 servers that have the File Server role service installed. Users successfully access shared folders on the file servers by using permissions granted to the Authenticated Users group. 

You migrate the file servers to adatum.com. 

Contoso users report that after the migration, they are unable to access shared folders on the file servers. 

You need to ensure that the Contoso users can access the shared folders on the file servers. 

What should you do? 

A. Disable selective authentication on the existing forest trust. 

B. Disable SID filtering on the existing forest trust. 

C. Run netdom and specify the /quarantine attribute. 

D. Replace the existing forest trust with an external trust. 

Answer: B 

Explanation: 

Although it is not recommended, you can use this procedure to disable security identifier (SID) filter quarantining for an external trust with the Netdom.exe tool. You should consider disabling SID filter quarantining only in the following situations: 

* Users have been migrated to the trusted domain with their SID histories preserved, and you want to grant those users access to resources in the trusting domain (the former domain of the migrated users) based on the sIDHistory attribute. 

Etc. 

Reference: Disabling SID filter quarantining 

http://technet.microsoft.com/en-us/library/cc794713(v=ws.10).aspx 


Q98. Your network contains an Active Directory domain named adatum.com. The domain contains two sites named Site1 and Site2 and two domain controllers named DC1 and DC2. DC1 is located in Site1 and DC2 is located in Site2. 

You install an additional domain controller named DC3 in Site1 and you ship DC3 to Site2. 

A technician connects DC3 to Site2. 

You discover that users in Site2 are authenticated only by DC2. 

You need to ensure that the users in Site2 are authenticated by both DC2 and DC3. 

What should you do? 

A. In Active Directory Users and Computers, configure the msDS-PrimaryComputer attribute for DC3. 

B. In Active Directory Users and Computers, configure the msDS-Site-Affinity attribute for DC3. 

C. From Active Directory Sites and Services, move DC3. 

D. From Active Directory Sites and Services, modify the site link between Site1 and Site2. 

Answer: C 

Explanation: 

DC3 needs to be moved to Site2 in AD DS 

Reference: Move a domain controller between sites 

http://technet.microsoft.com/en-us/library/cc759326(v=ws.10).aspx 


Q99. Your network contains an Active Directory forest. The forest contains one domain named adatum.com. The domain contains three domain controllers. The domain controllers are configured as shown in the following table. 


DC2 has all of the domain-wide operations master roles. DC3 has all of the forest-wide operation master roles. 

You need to ensure that you can use Password Settings objects (PSOs) in the domain. 

What should you do first? 

A. Uninstall Active Directory from DC1. 

B. Change the domain functional level. 

C. Transfer the domain-wide operations master roles. 

D. Transfer the forest-wide operations master roles. 

Answer: A 

Explanation: 

In Windows Server 2008 and later, you can use fine-grained password policies to specify multiple password policies and apply different password restrictions and account lockout policies to different sets of users within a single domain. 

Note: In Microsoft Windows 2000 and Windows Server 2003 Active Directory domains, you could apply only one password and account lockout policy, which is specified in the domain's Default Domain Policy, to all users in the domain. As a result, if you wanted different password and account lockout settings for different sets of users, you had to either create a password filter or deploy multiple domains. Both options were costly for different reasons. 

Reference: AD DS Fine-Grained Password and Account Lockout Policy Step-by-Step Guide 


Q100. Your network contains an Active Directory domain named contoso.com. The domain contains a domain controller named DC1 and a member server named Server1. Server1 

has the IP Address Management (IPAM) Server feature installed. 

On Dc1, you configure Windows Firewall to allow all of the necessary inbound ports for 

IPAM. 

On Server1, you open Server Manager as shown in the exhibit. (Click the Exhibit button.) 


You need to ensure that you can use IPAM on Server1 to manage DNS on DC1. 

What should you do? 

A. Modify the outbound firewall rules on Server1. 

B. Modify the inbound firewall rules on Server1. 

C. Add Server1 to the Remote Management Users group. 

D. Add Server1 to the Event Log Readers group. 

Answer: D 

Explanation: 

To access configuration data and server event logs, the IPAM server must be a member of the domain IPAM Users Group (IPAMUG). The IPAM server must also be a member of the Event Log Readers security group. 

Note: The computer account of the IPAM server must be a member of the Event Log Readers security group. 

Reference: Manually Configure DC and NPS Access Settings. http://technet.microsoft.com/en-us/library/jj878317.aspx http://technet.microsoft.com/en-us/library/jj878313.aspx